Professional Documents
Culture Documents
Computer Crime
Computer Crime
Computer Crime
Computer crime can be defined as any offense that uses or somehow involves a computer or any
violation of the criminal law that involves the knowledge of computer technology for its
perpetration, investigation, or prosecution.
Computer crime can also be defined as illegal activities that make use of electronic systems as a
means to affect the security of computer systems and computer data.
The Internet Crime Complaint Center has identified several other forms of Internet fraud crimes.
The additional forms include:
Advance Fee Fraud Schemes-in, which the victim is required to pay significant fees in advance of
receiving a substantial amount of money or merchandise. The fees are usually passed off as taxes,
or processing fees, or charges for notarized documents. The victim pays these fees and receives
nothing in return. Perhaps the most common example of this type of fraud occurs when a victim is
expecting a large payoff for helping to move millions of dollars out of a foreign country. The victim
may also believe he has won a large award in a nonexistent foreign lottery.
Business/Employment Schemes-typically incorporate identity theft, freight forwarding, and
counterfeit check schemes. The fraudster posts a help-wanted ad on popular Internet job search
sites. Respondents are required to fill out an application wherein they divulge sensitive personal
information, such as their date of birth and Social Security number. The fraudster uses that
information to purchase merchandise on credit. The merchandise is sent to another respondent who
has been hired as a freight forwarder by the fraudster. The merchandise is then reshipped out of the
country. The fraudster, who has represented himself as a foreign company, then pays the freight
forwarder with a counterfeit check containing a significant overage amount. The overage is wired
back to the fraudster, usually in a foreign country, before the fraud is discovered.
Credit/Debit Card Fraud-is the unauthorized use of a credit/debit card to fraudulently obtain
money or property. Credit/debit card numbers can be stolen from unsecured web sites, or can be
obtained in an identity theft scheme. Freight forwarding/Reshipping-the receiving and subsequent
reshipping of an on- line ordered merchandise to locations usually abroad. Individuals are often
solicited to participate in this activity in chat rooms, or through Internet job postings. Unbeknownst
to the reshipper, the merchandise has been paid for with fraudulent credit cards.
Identity theft- occurs when someone appropriates another’s personal information without his or her
knowledge to commit theft or fraud. Identity theft is a vehicle for perpetrating other types of fraud
schemes. Typically, the victim is led to believe they are divulging sensitive personal information to
a legitimate business, sometimes as a response to an e-mail solicitation to update billing or
membership information, or as an application to a fraudulent Internet job posting.
Investment Fraud- an offering that uses fraudulent claims to solicit investments or loans, or that
provides for the purchase, use, or trade of forged or counterfeit securities.
Investment Fraud- an offering that uses fraudulent claims to solicit investments or loans, or that
provides for the purchase, use, or trade of forged or counterfeit securities.
Phony Escrow Services-in an effort to persuade a wary Internet auction participant, the fraudster
will propose the use of a third-party escrow service to facilitate the exchange of money and
merchandise. The victim is unaware the fraudster has spoofed a legitimate escrow service. The
victim sends payment or merchandise to the phony escrow and receives nothing in return.
Ponzi/Pyramid Schemes-investors are enticed to invest in this fraudulent scheme by the promises
of abnormally high profits. However, no investments are actually made by the so called “investment
firm”. Early investors are paid returns with the investment capital received from subsequent
investors. The system eventually collapses and investors do not receive their promised dividends
and lose their initial investment.
Phishing
The Anti-Phishing Working Group defines Phishing as “a form of online identity theft that uses
spoofed emails designed to lure recipients to fraudulent websites which attempt to trick them into
divulging personal financial data such as credit card numbers, account usernames and passwords,
social security numbers, etc.” (Anti-Phishing Working Group, 2004). An example of a phishing
website can be seen in Figure 1. An example of a phishing website can be seen in Figure 1.
Unauthorized Access
Unauthorized access is a prerequisite to many forms of computer crimes and computer fraud. This
form of crime amounts to electronic intrusion, or gaining access to resources via a computer
resource without permission. Unauthorized access may occur both on individuals’ personal
computers, as well as in the workplace. One major form of unauthorized access is known as
hacking. Hacking is “...the act of gaining unauthorized access to a computer system or network and
in some cases making unauthorized use of this access.” (Rushinek & Rushinek, 1993) As stated
previously, unauthorized access may be a gateway to commit other offenses.
Denial of Service
A denial of service attack is a targeted effort to disrupt a legitimate user of a service from having
access to the service. This may be accomplished through a number of methods. Offenders can limit
or prevent access to services by overloading the available resources, changing the configuration of
the service’s data, or physically destroying the available connections to the information (CERT,
2001).
Crimes of this type have been perpetrated against major online entities, such as Yahoo.com,
eBay.com, CNN.com, and Buy.com. In these crimes, offenders most often attempt to overload the
sites with electronic connections in order to disrupt service to legitimate users (CNNMoney, 2000).
Online Pornography
Online child pornography is defined by pedophiles using computer resources to distribute illegal
media of and to minors, as well as engaging in actions to sexually exploit children. At the national
level, the FBI’s Innocent Images National Initiative, an element of their Cyber Crimes Program,
investigates these types of crimes and coordinates with regional
Online harassment
Online harassment is unwanted contact by offenders that may negatively impact a victim’s
livelihood, well-being, and mental or emotional state. One of the most common forms online
harassment takes is that of cyberstalking.
Cyberstalking
Cyberstalking is using a computer in the perpetration of the traditional crime of stalking. The
traditional crime of stalking usually involves “harassing and threatening behavior that an individual
engages in repeatedly, such as following a person, appearing at a person’s home or place of
business, making harassing phone calls, leaving messages or objects, or vandalizing a person’s
property. Cyberstalker involves the use of a computer in the perpetration of those acts. People can
cyberstalk others by sending harassing or threatening messages through e-mail, instant messaging,
or by posting messages on websites/chat rooms. However, there are other, unconventional ways to
cyberstalk an individual.
Spam
Another form of computer crime is spam mail. Spam mail is the distribution of bulk e-mail that
offers recipients deals on products or services. The purpose of spam mail is to make customers think
they are going to receive the real product or service at a reduced price. However, before the deal can
occur, the sender of the spam asks for money, the recipients’ credit card number or other personal
information. The customer will send that information and never receive the product nor hear from
the spammer. The case of Jeremy Jaynes is a prime example of what a criminal can do with spam
mail.
Malicious Programs/Viruses
Viruses and malicious programs can potentially impact a massive amount of individuals and
resources. These programs are intended to cause electronic resources to function abnormally and
may impact legitimate users access to computer resources. For instance, the “Melissa” virus
released in early 1999 contaminated 1.2 million computers used by U.S. businesses, impacted
computer resources throughout the U. S. and Europe, and is estimated to have created eighty million
dollars in damages worldwide (Computer Crimes and Intellectual Property Section, 2003).
An example of a malicious program can be seen in the investigation of Claude R. Carpenter, an
Internal Revenue Service systems technician who plead guilty to inserting malicious code into IRS
three computer systems, which was designed to erase all of the
Cyberterrorism
Cyberterrorism is the adaptation of terrorism to computer resources, whose urpose is to cause fear
in its victims by attacking electronic resources.